Exam 4: Information Security Governance and Risk Management
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
A quantitative risk analysis does not assign monetary and numeric values to all facets of the risk analysis process.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
The data custodian implements the information classification and controls after they are determined.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
After an organization understands its total and residual risk, it must determine how to get rid of the risk.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
Commercial organizations usually classify data using five main classification levels: Top Secret, Secret, Confidential, Sensitive but Unclassified, and Unclassified.
(True/False)
4.9/5
(40)
Which risk handling method defines the acceptable risk level the organization can tolerate and reduces the risk to that level?
(Multiple Choice)
4.8/5
(35)
Which type of data includes patents, trade secrets, and other information that could seriously affect the government if unauthorized disclosure occurred?
(Multiple Choice)
4.9/5
(34)
What is the probability that a threat agent will exploit vulnerability and the impact if the threat is carried out?
(Multiple Choice)
4.9/5
(33)
Policies are broad and provide the foundation for development of standards, baselines, guidelines, and procedures.
(True/False)
4.7/5
(35)
The first step of a risk assessment is to identify threats and vulnerabilities.
(True/False)
4.8/5
(34)
One of the disadvantages of qualitative risk analysis is that all results are subjective.
(True/False)
4.9/5
(42)
According to the NIST SP 800-30, what is the last step of a risk assessment?
(Multiple Choice)
4.9/5
(27)
Which role evaluates the security needs of the organization and develops the internal information security governance documents?
(Multiple Choice)
4.8/5
(27)
Tangible assets include intellectual property, data, and organizational reputation.
(True/False)
4.8/5
(37)
Which of the following is an enterprise security architecture framework?
(Multiple Choice)
4.9/5
(35)
What is the calculation you should use for safeguard value?
(Multiple Choice)
4.8/5
(31)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)